nix-dotfiles/machines/elrond/routes.nix

132 lines
4.0 KiB
Nix
Raw Permalink Normal View History

{ config, pkgs, lib, ... }:
{
services.nginx = {
2024-05-25 19:47:29 +02:00
virtualHosts."lauterer.it" = {
forceSSL = true;
useACMEHost = config.networking.domain;
locations."/" = {
proxyWebsockets = true;
proxyPass = "http://100.84.215.84";
};
};
2024-05-21 23:58:55 +02:00
virtualHosts."managment.lauterer.it" = {
forceSSL = true;
useACMEHost = config.networking.domain;
locations."/" = {
proxyWebsockets = true;
2024-05-21 23:58:55 +02:00
proxyPass = "http://100.104.182.48";
};
basicAuthFile = config.sops.secrets."nginx/defaultpass".path;
};
virtualHosts."funn-nas.lauterer.it" = {
forceSSL = true;
useACMEHost = config.networking.domain;
locations."/" = {
proxyWebsockets = true;
proxyPass = "https://100.104.182.48:30044";
};
basicAuthFile = config.sops.secrets."nginx/defaultpass".path;
};
2024-06-16 13:22:18 +02:00
virtualHosts."film.lauterer.it" = {
forceSSL = true;
useACMEHost = config.networking.domain;
locations."/" = {
proxyWebsockets = true;
proxyPass = "http://100.104.182.48:8096";
};
};
virtualHosts."home.lauterer.it" = {
forceSSL = true;
useACMEHost = config.networking.domain;
locations."/" = {
proxyWebsockets = true;
proxyPass = "http://10.0.0.32:8123";
};
# ignorerer sikkerhet for littegran for å oprettholde lettvinthet og app kompatibilitet.
#basicAuthFile = config.sops.secrets."nginx/defaultpass".path;
};
2024-11-04 10:56:54 +01:00
virtualHosts."hybel.lauterer.it" = {
forceSSL = true;
useACMEHost = config.networking.domain;
locations."/" = {
proxyWebsockets = true;
proxyPass = "http://100.109.23.4:8123";
};
# ignorerer sikkerhet for littegran for å oprettholde lettvinthet og app kompatibilitet.
#basicAuthFile = config.sops.secrets."nginx/defaultpass".path;
};
2024-05-19 00:15:13 +02:00
virtualHosts."jellyfin.lauterer.it" = {
2024-04-28 14:42:49 +02:00
forceSSL = true;
useACMEHost = config.networking.domain;
locations."/" = {
proxyWebsockets = true;
proxyPass = "http://100.84.215.84:8096";
};
};
2024-05-01 16:17:45 +02:00
virtualHosts."podgrab.lauterer.it" = {
forceSSL = true;
useACMEHost = config.networking.domain;
locations."/" = {
proxyWebsockets = true;
proxyPass = "http://100.84.215.84:4242";
};
basicAuthFile = config.sops.secrets."nginx/defaultpass".path;
2024-05-18 20:32:54 +02:00
};
2024-04-28 15:04:31 +02:00
2024-05-21 23:58:55 +02:00
virtualHosts."rss.lauterer.it" = {
2024-05-18 20:32:54 +02:00
forceSSL = true;
useACMEHost = config.networking.domain;
locations."/" = {
proxyWebsockets = true;
2024-05-21 23:58:55 +02:00
proxyPass = "http://100.84.215.84:8081";
2024-05-18 20:32:54 +02:00
};
2024-05-21 23:58:55 +02:00
#basicAuthFile = config.sops.secrets."nginx/defaultpass".path;
2024-08-30 01:58:26 +02:00
};
#virtualHosts."azul.256.no" = {
# forceSSL = true;
# useACMEHost = config.networking.domain;
# locations."/" = {
# proxyWebsockets = true;
# proxyPass = "http://100.84.215.84:8085";
# };
# #basicAuthFile = config.sops.secrets."nginx/defaultpass".path;
#};
2024-04-28 15:04:31 +02:00
2024-06-05 17:21:19 +02:00
virtualHosts."azul.256.no" = {
forceSSL = true;
useACMEHost = config.networking.domain;
locations."/" = {
proxyWebsockets = true;
2024-10-30 14:51:42 +01:00
proxyPass = "http://localhost:8095";
2024-06-05 17:21:19 +02:00
};
#basicAuthFile = config.sops.secrets."nginx/defaultpass".path;
};
2024-08-30 01:58:26 +02:00
2024-06-05 17:21:19 +02:00
2024-05-23 21:02:27 +02:00
#virtualHosts."shiori.lauterer.it" = config.services.nginx.virtualHosts."archive.lauterer.it";
#virtualHosts."pocket.lauterer.it" = config.services.nginx.virtualHosts."archive.lauterer.it";
#virtualHosts."bookmarks.lauterer.it" = config.services.nginx.virtualHosts."archive.lauterer.it";
virtualHosts."archive.lauterer.it" = {
forceSSL = true;
useACMEHost = config.networking.domain;
locations."/" = {
proxyWebsockets = true;
proxyPass = "http://100.84.215.84:8082";
};
#basicAuthFile = config.sops.secrets."nginx/defaultpass".path;
};
2024-05-25 19:47:29 +02:00
2024-05-23 21:02:27 +02:00
};
2024-04-28 14:42:49 +02:00
}